Posts

Case Laws for CCTV as Best Evidence

CCTV Footage- Primary Evidence-  CCTV footage directly & immediately stored in hard drive of computer is original media, self generated & created without human intervention- Not secondary evidence & does not require certification u/s 65B of Evidence Act. Kishan Tripathi v. State, Crl.A.108/13, 12.2.16 DHC -—-–—–-—––—-–— : Procedure to be followed by Magistrate when CCTV footage and video recordings is produced by police at the time of filing of chargesheet?            During the hearing of the case, we noticed that the trial Court had not played the DVR (MO-2) and seen the CCTV footages in the presence of the accused. In this regard we propose to dispel misgivings, if any, in the mind of trial Judges about their power to view such evidences. There will be instances where, by the time the case comes up for trial in one court, the electronic record would have had a natural death for want of proper storage facilities in the Court property room. To obviate these difficulties, w

Trojan targeting your bank codes sent on Mobile

Image
A new Android trojan has the ability to intercept text messages and bypass the SMS-based two-factor authentication system protecting customers' bank accounts. The trojan, detected as   "Android/Spy.Agent.SI"   is currently targeting customers of large banks via their mobile apps. The malware tricks users into downloading it onto their devices by masquerading as Adobe Flash Player. Upon installation, it requests that the user grant the malicious app administrator rights, before seemingly disappearing from view. Rest assured, however, that while the Flash Player icon might no longer be visible, the trojan is just getting started.At this point, Android/Spy.Agent.SI contacts a remote server hosting malicious APK files whose corresponding URL paths are regenerated hourly in a bid to avoid detection by anti-virus software. The trojan uses this connection to send information about the infected device, along with the package names of installed applications, to its opera

Stages of Cyber Civil Cases in Indian

Image
STAGES IN a Cyber CIVIL Case / Suit in India- (Plaintiff Means whoever files the case ) By Advocate Prashant Mali(@CyberMahaGuru) 1. Plaintiff has to file the plaint complying the provisions in all respect as contemplated under Order 4 r/w Order 6 and 7 of the code. 2. Plaintiff  has to issue summons within 30 days from the institution of suit. 3. After the service of summons defendant has to file his written statement within 30 days from the receipt of summons as per Order 8 R 1 of the code 4. No further time exceeding 90 days after date of service of summons be extended for filing written statement as per proviso to Order 8 R 1 of the code. 5. Within 10 days from the filing of written statement court has to examine the parties so as to explore the possibilities of compromise in between the parties and to refer the matter of settlement under section 89 of the code. 6. If parties fail to compromise the matter then court has to keep the matter for d

Can a Complainant or Victim fight his own cyber crime case or appoint his own Lawyer?

Image
Can a Complainant or Victim fight his own cyber crime case in Magistrates Court or appoint his own lawyer? Note: Normally when one files a police FIR, the case is represented free of cost by the STATE in the courts i.e By Public Prosecutor. Yes !!! He can by himself or through his Expert Legal Counsel or a Lawyer. But he has to file a written application making out a case, so that the magistrate can exercise the jurisdiction as vested in him and form the requisite opinion. A plain reading of Section 301 reveals that though oral submissions before the court cannot be independent of the Prosecutor, a pleader instructed by a private person can definitely file written submissions before the court independent of the Public Prosecutor, if the court so permits. That apart, Sections 301 and 302 cover two different situations. Section 301 envisages a situation where the Public Prosecutor is in charge of a case and a private person instructs his pleader to intervene. In such ca

International LEA Cyber Crime Operations of 2015

Image
What was so different in 2015? Wasn’t it just more of the same? Well, not quite. As the year has ended, lets look back at some unprecedented cases that redefined risk and loss resulting from cyber attacks and international cooperation amongst International Law and Enforcement agencies. There is a common denominator that groups them as one: The mob has fully moved into the Web.  I feel there is no such thing as ‘disorganized cybercrime' hence 'Organised and concerted International action against cyber crime is the need of the hour" Examples of LEA Cyber Crime operations in 2015: An international operation involving law enforcement organisations, government cyber security teams and private organisations has targeted the Dorkbot botnet. Europol, Interpol, the US department of homeland security, the US National Cyber Investigative Joint Taskforce and the FBI partnered with Microsoft and other private sector organisations to disrupt the  Dorkbot  infrastructure, i

Malware in Cars and Hacking Cars

If a hacker were to bring in a malware-harboring car for service, the vehicle could spread that infection to a dealership’s testing equipment, which in turn would spread the malware to every vehicle the dealership services, kicking off an epidemic of nasty code capable of attacking critical driving systems like transmission and brakes. Once you compromise a dealership, you’d have a lot of control,” “You could create a malicious car…The worst case would be a virus-like system where a car pulls in, infects the dealership, and the dealership then spreads that infection to all the other cars.” That “auto brothel” attack is hypothetical, but it’s not as farfetched as it might seem. In 2010 and 2011, researchers at the University of California at San Diego and the University of Washington revealed a slew of hackable vulnerabilities in a 2009 Chevy Impala that allowed them to perform tricks like disabling its brakes, although they didn’t name the make or model of the vehicle at the time. One

Malware and Ransomeware analysis in 2015

In 2015, there were 1,966,324 registered notifications about attempted malware infections that aimed to steal money via online access to bank accounts.Ransomware programs were detected on753,684 computers of unique users; 179,209 computers were targeted by encryption ransomware.Kaspersky Lab’s web antivirus detected121,262,075 unique malicious objects: scripts, exploits, executable files, etc.Kaspersky Lab solutions repelled 798,113,087attacks launched from online resources located all over the world.34.2% of user computers were subjected to at least one web attack over the year.To carry out their attacks, cybercriminals used6,563,145 unique hosts.24% of web attacks neutralized by Kaspersky Lab products were carried out using malicious web resources located in the US.Kaspersky Lab’s antivirus solutions detected a total of 4,000,000 unique malicious and potentially unwanted objects.